c:\autobuild\root\vundofixtool\trunk\release\VundoFixTool.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3730ccab4c142d711fa371a93f4c798d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3730ccab4c142d711fa371a93f4c798d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3730ccab4c142d711fa371a93f4c798d_JaffaCakes118
-
Size
18.6MB
-
MD5
3730ccab4c142d711fa371a93f4c798d
-
SHA1
606cc919c0b747490d844bc5a20ea954bccbb7b3
-
SHA256
0eb1250881c46928e9f8832b409148fab6eb429dfe725112375bdcd71c003df6
-
SHA512
d50fb99065f5029d465f9113648157b51dbf0aa1cabe846039b912e00be4c501dd4d44356c3147eb6a2a8f4cd02e04407820f6bc0be4faa6fb67ecb38edf91ae
-
SSDEEP
49152:V2WHsTyM1lIQhveqtGT5oG6L+ZmVQ5HmXYWVdzjGGgGdy/6UmRQ5t:BH7clFhRt9KZmu59aFPgGd4VmO5t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3730ccab4c142d711fa371a93f4c798d_JaffaCakes118
Files
-
3730ccab4c142d711fa371a93f4c798d_JaffaCakes118.exe windows:4 windows x86 arch:x86
54610a190b6c8afaab2aace2b4ea2357
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
tcl
Tcl_ProcCmd
Tcl_FreeList
Tcl_SplitList
Tcl_CreateCommand
Tcl_DeleteInterp
Tcl_GetStringResult
Tcl_DeleteClone
Tcl_Clone_Interp
Tcl_CreateInterp
Tcl_SetResult
Tcl_EvalEx
kernel32
WriteFile
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
GlobalDeleteAtom
GetModuleFileNameW
SetThreadPriority
SuspendThread
GlobalAddAtomA
GetCurrentProcessId
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
LocalAlloc
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedIncrement
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
VirtualProtect
VirtualQuery
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
SetStdHandle
GetFileType
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
SetEnvironmentVariableA
ExitProcess
RaiseException
HeapSize
GetACP
IsValidCodePage
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
CreateProcessA
SearchPathA
GetLogicalDriveStringsA
lstrcatA
ReadFile
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
ConnectNamedPipe
VirtualFree
VirtualAlloc
DisconnectNamedPipe
FlushFileBuffers
SetCurrentDirectoryA
GetFileSize
TerminateThread
CreateFileA
GetSystemTime
SystemTimeToFileTime
InterlockedDecrement
WinExec
lstrcpynA
FileTimeToLocalFileTime
GetSystemDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetTempPathA
WritePrivateProfileStringA
HeapFree
GetProcessHeap
HeapAlloc
FreeLibrary
LoadLibraryA
GetSystemInfo
FormatMessageA
FileTimeToSystemTime
GetFileTime
TerminateProcess
ExpandEnvironmentStringsA
DeleteFileA
LocalFree
GetFileAttributesA
CreateNamedPipeA
GetCurrentProcess
SetLastError
GetVersionExA
DeleteCriticalSection
FreeConsole
CreateDirectoryA
GetLocalTime
Sleep
InitializeCriticalSection
GetModuleFileNameA
lstrcpyA
LeaveCriticalSection
SetConsoleScreenBufferSize
EnterCriticalSection
GetStdHandle
GetConsoleScreenBufferInfo
AllocConsole
MulDiv
GlobalUnlock
ResetEvent
GlobalLock
SetEvent
WaitForSingleObject
CloseHandle
GetWindowsDirectoryA
CreateEventA
GlobalAlloc
ResumeThread
GlobalFree
GetProcAddress
FreeResource
GetModuleHandleA
GetEnvironmentVariableA
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
UnhandledExceptionFilter
user32
RegisterClipboardFormatA
PostThreadMessageA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
GetScrollInfo
CallWindowProcA
OffsetRect
IntersectRect
GetWindowPlacement
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
CheckMenuItem
GrayStringA
DrawTextExA
TabbedTextOutA
UnhookWindowsHookEx
GetKeyState
GetFocus
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
PeekMessageA
DispatchMessageA
TranslateMessage
GetSysColorBrush
SystemParametersInfoA
GetWindowDC
ScreenToClient
ModifyMenuA
EqualRect
IsWindow
DeleteMenu
PtInRect
LoadIconA
IsIconic
DrawIcon
FindWindowA
GetDesktopWindow
ExitWindowsEx
MessageBoxA
TrackMouseEvent
GetSystemMetrics
GetNextDlgGroupItem
InvalidateRgn
CopyIcon
GetCaretPos
LoadBitmapA
RegisterClassExA
DrawTextA
GetWindowTextA
IsRectEmpty
CopyAcceleratorTableA
SetCapture
MessageBeep
WinHelpA
RedrawWindow
SetTimer
HideCaret
SendMessageA
CharNextA
SetWindowContextHelpId
MapDialogRect
DestroyMenu
InflateRect
RegisterWindowMessageA
EnableMenuItem
CharUpperA
EnableWindow
GetWindowRect
CopyRect
PostMessageA
GetWindowLongA
KillTimer
SetWindowLongA
SetWindowPos
SetRect
GetCursorPos
LoadMenuA
SetForegroundWindow
GetSubMenu
LoadImageA
SetWindowRgn
GetClientRect
InvalidateRect
GetDC
ReleaseDC
GetParent
GetWindowTextLengthA
SendMessageCallbackA
CreateWindowExA
EndPaint
BeginPaint
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
UnregisterClassA
WindowFromPoint
GetCapture
ReleaseCapture
ClientToScreen
DrawFocusRect
DrawEdge
SetClassLongA
SetCursor
GetSysColor
DestroyCursor
FillRect
LoadCursorA
RegisterClassA
gdi32
GetCurrentObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
ExtSelectClipRgn
CreateRectRgn
CreatePen
CreateRectRgnIndirect
GetTextExtentPoint32A
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
GetPixel
CreateSolidBrush
DeleteObject
GetObjectA
MoveToEx
LineTo
GetClipBox
SetMapMode
RestoreDC
SaveDC
GetDIBits
CreateFontA
SetTextColor
SetBkColor
SetBkMode
CreateFontIndirectA
SelectClipRgn
ExtTextOutA
GetTextMetricsA
GetDeviceCaps
DeleteDC
SelectObject
Rectangle
GetStockObject
CreatePatternBrush
CreateCompatibleBitmap
BitBlt
StretchBlt
CombineRgn
CreateCompatibleDC
CreateBitmap
ExtCreateRegion
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
_TrackMouseEvent
shlwapi
PathIsUNCA
PathIsDirectoryA
SHDeleteKeyA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
UrlUnescapeA
PathFileExistsA
oledlg
ord8
ole32
CoCreateInstance
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
CLSIDFromString
CoRegisterMessageFilter
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
OleFlushClipboard
oleaut32
VariantClear
SysAllocString
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
SysFreeString
OleCreateFontIndirect
VariantCopy
SysAllocStringLen
SafeArrayDestroy
OleLoadPicture
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
HttpQueryInfoA
InternetCloseHandle
InternetGetLastResponseInfoA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
zlib
inflateEnd
inflateInit2_
inflate
msimg32
GradientFill
Sections
.text Size: 824KB - Virtual size: 822KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17.4MB - Virtual size: 17.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ